Email Autoresponder Free

Main Menu

  • Home
  • Email accounts
  • Email marketing
  • Email newsletter
  • Email verifier

Email Autoresponder Free

Header Banner

Email Autoresponder Free

  • Home
  • Email accounts
  • Email marketing
  • Email newsletter
  • Email verifier
Email accounts
Home›Email accounts›What happens to email accounts once credentials are compromised?

What happens to email accounts once credentials are compromised?

By Michael E. McChristian
June 9, 2021
0
0

Agari researchers seized unique credentials belonging to fake characters from phishing sites posing as widely used enterprise apps, and waited to see what the phishers would do next with the compromised accounts .

They found that 23% of all accounts were accessed almost immediately (likely in an automated way, to confirm credentials worked), 50% of accounts were accessed manually within 12 hours of the compromise, and 91% of Compromised accounts were manually accessible during the first week.

How are compromised accounts used?

The phishing pages where the researchers planted the unique credentials impersonated Microsoft OneDrive, Office 365, SharePoint, Adobe Document Cloud, or just (generically) Microsoft.

After six months, they detected activity in nearly 40% of their “compromised” accounts.

“Although the majority of compromised accounts (64%) were only viewed once, a number of accounts were accessed multiple times over an extended period of time. In fact, one account was viewed 94 times out of a period of four and a half months, a prime example of the persistent and continuous access that cybercriminals maintain on compromised email accounts,” they noted.

Attackers use hacked corporate mailboxes to identify employees who have access to a company’s financial/payment information system. They often set up email forwarding or forwarding rules to get an immediate overview of incoming and outgoing emails.

Some of the attackers move from email to other Office 365 applications, the researchers noted, and use them to search for valuable documents or even to download files (fake invoices and the like) that will be used for phishing attacks or subsequent fraud attempts.

But, most of the time, the attackers used the hacked email accounts to send more phishing emails, sometimes targeting specific industries and sometimes a wide variety of them, and to set up an infrastructure of additional Business Email Compromise (BEC) (for example, to sign up for a variety of services that will allow them to perform reconnaissance and lead generation, send emails, host malicious pages or create malicious documents).

“By tricking people into giving up their credentials, threat actors can use legitimate accounts to run their malware – a dream come true from their perspective,” the researchers noted.

And compromised accounts lead to more phishing emails and more compromised accounts and more phishing – and so on, in an endless cycle that should be stopped.

Tagsemail accounts

Categories

  • Email accounts
  • Email marketing
  • Email newsletter

Recent Posts

  • How to start an email newsletter
  • Email Marketing and Marketing Automation: The Differences Explained
  • 4 Ways to Use Video in Your Email Marketing Campaigns
  • 5 Best ConvertKit Alternatives for Email Marketing Campaigns
  • Here’s why email marketing is (still) important in 2022

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • September 2020
  • June 2020
  • May 2020
  • December 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • March 2018
  • January 2018
  • September 2017
  • November 2016
  • July 2016
  • October 2015
  • April 2015
  • July 2014
  • March 2014
  • June 2013
  • September 2011
  • July 2011
  • Privacy Policy
  • Terms and Conditions